Testimony of Gerard Keegan CTIA Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018 On behalf of CTIA, the trade association for the wireless communications industry, thank you for the opportunity to testify on the wireless industry s efforts to help the corrections community combat the problem of wireless device contraband in our nation s correctional facilities. Wireless carriers have no legitimate users imprisoned or detained in correctional facilities and no interest in seeing inmates use wireless services for any reason. We fully support policymakers efforts to keep contraband wireless phones out of correctional institutions. We are dedicated to continue our work to develop and implement measures to help solve this problem while preserving the ability for law-abiding members of the public to continue to reliably access the wireless services provided by CTIA s member companies. Recently, the wireless industry has devoted significant resources and funding to help combat this problem. In April, we formed a task force consisting of corrections officials, wireless carrier representatives, and FCC staff and brought on Dr. Charles Clancy to administer a test bed of Contraband Interdiction System (CIS) technologies, including jamming. Dr. Clancy is a professor of electrical engineering at Virginia Tech, where he directs the Hume Center for National Security and Technology. Prior to joining Virginia Tech, he led wireless technology research programs at the National Security Agency. In that role, he worked on a range of cellphone-related programs. Dr. Clancy is
an internationally-recognized expert in wireless security, has chaired standards committees within the IETF and Wireless Innovation Forum, and has testified before Congress. He is co-author of 5 books, 22 patents, and over 200 academic papers on wireless communications. Dr. Clancy and a team from the Virginia Tech Applied Research Corporation will begin testing CIS technologies at his lab in Arlington, VA, and will then conduct field testing at two correctional facilities. After he completes his testing, Dr. Clancy will draft a report summarizing the test results of the various CIS technologies. Amongst other things, the reports generated under this effort will include (1) technology assessments, (2) key metrics for each technology, (3) best practices on deployment of the CIS technologies, and (4) an evaluation of the viability of the technologies tested. While we originally intended for this to be a 12 to 16 month project, we condensed it down to 8 months at the request of the corrections officials on the task force. Accordingly, our goal now is to complete testing and issue Dr. Clancy s report by the end of the calendar year. To meet this expedited timeframe, we have been working at a rapid pace over the past several months. The task force held its first face-to-face meeting in April and then held a vendor workshop and our second task force meeting in June. Earlier this month, we issued a solicitation for CIS vendors to submit applications to participate in the test bed. On August 10, we will hold our third task force meeting at Dr. Clancy s lab in Arlington, VA. Dr. Clancy intends to begin testing at the lab as soon as next week. Notably, our first field test site will be Lee Correctional Institution in Bishopville. Dr. Clancy and his team will be conducting their initial site visit at Lee next month with the 2
expectation to begin testing in September. We also plan to hold our fourth task force meeting at Lee, likely in October. The task force has also been busy evaluating legal and administrative practices, including court orders, for directing carriers to take action against contraband devices. Moreover, CTIA and our members have been working closely with Director Stirling to develop a court order process that would direct wireless carriers to disable commercial service to a device identified as contraband. Additionally, the wireless industry has been working diligently to deploy the stolen phones database for use in combatting contraband devices in correctional facilities. Carriers are able to render SIM cards inoperable, but we have heard that inmates often swap out SIM cards. We now believe we will be able to render wireless service inoperable to a contraband device so that wireless service will not work even if inmates swap out SIM cards. To do this, we are going to extend the existing stolen phone database to contraband devices. As I hope our recent efforts make clear, helping to eliminate contraband phones in prisons is a wireless industry priority. Over the past decade, CTIA and its member companies have actively worked with managed access and cell detection technology vendors to identify approaches that would curb the use of contraband cell phones in prisons. To facilitate the deployment of managed access systems, wireless carriers have entered into numerous spectrum lease agreements with multiple providers, including one recently in South Carolina. In addition, we have provided significant technical assistance to these vendors to address operability challenges and prevent interference with cellular networks. We are firmly committed to doing more. 3
The wireless industry has worked, and will continue to work, collaboratively with various stakeholders, including corrections officials, to address the serious problem of contraband wireless devices. The wireless industry and corrections facilities have embraced managed access technologies as an effective means of preventing unauthorized wireless communications within prisons. While jamming has been cited as a means of curbing contraband device use, there are harmful side effects to the use of jamming technologies, which is why the use of jammers is generally prohibited under federal law. Managed Access. Managed access and other detection systems have proven effective in combating the use of contraband wireless devices in prisons. Managed access systems are micro-cellular, private networks that analyze transmission to and from wireless devices to determine whether the device is authorized to access public carrier networks. Managed access system base stations capture voice, text, and data communications within the system s coverage area and cross-check the identifying information of the device against a list of authorized devices. If the device is not authorized, communications are terminated. Meanwhile, users of authorized devices may continue to access public carrier networks as they normally would. To operate managed access systems, operators of these private networks require a right to transmit over valuable commercial mobile spectrum licensed to commercial wireless carriers. Wireless carriers whose licensed service areas overlap the footprint of state or local corrections facilities work with managed access system providers to arrange for access to spectrum. Once consent is obtained from the carrier, a lease 4
application is filed with the FCC to enable managed access system deployment on the carrier s spectrum. Managed access systems have been deployed throughout the country and are currently used at a number of state and local corrections facilities. The wireless industry favors managed access systems because they block unauthorized communications, reduce incentives for parties to smuggle contraband phones into prisons, and permit lawful communications to take place without interruption or degradation. Jammers. Our members have committed to assessing the impact of certain jammers on their networks as part of the test bed process discussed earlier. Under current law, though, jamming by non-federal entities constitutes an unlawful interference with radio communications in violation of Section 333 of the Communications Act. Consistent with this law, the FCC has taken swift and forceful action against the users and manufacturers of these unlawful devices. And there are sound policy and technical reasons for this, as jamming has proven it can be an overly blunt instrument. By blocking all wireless communications inside and near corrections facilities, legitimate communications are blocked and, if the jammer fails, corrections officials have no further recourse against users of contraband phones. More recently some of our member companies with operations along the border have experienced harmful interference from jammers operating in Mexico. This creates an extremely dangerous situation for lawful wireless users outside prison walls, who may find a critical call to 911 blocked by a malfunctioning or over-inclusive jammer. Moreover, jamming can disrupt service in the spectrum outside of the targeted 5
commercial band. Public safety radio communications, for example, operating in the 700 MHz and 800 MHz would be put at risk of interference from jammers, given their close proximity to commercial operations in those bands. Because of these issues, we have concerns with the use of cell phone jammers in correctional facilities. Note, however, that to the extent vendors of jamming technology choose to participate in the CIS Testbed evaluation, an assessment of jamming technology will be included in Dr. Clancy s final report. We aim to evaluate jammers in both the lab and one of the field tests. In closing, we stand committed to continue our work with federal and state officials, public safety representatives, and technology providers to combat this problem. Thank you for the opportunity to testify today. 6